argp / jemalloc_feng_shuiLinks
Example of manipulating Firefox's jemalloc-managed heap
☆28Updated 11 years ago
Alternatives and similar repositories for jemalloc_feng_shui
Users that are interested in jemalloc_feng_shui are comparing it to the libraries listed below
Sorting:
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- ☆32Updated 7 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Updated 9 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- exploit development☆49Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆43Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- ☆31Updated 7 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆38Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- ☆25Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- ☆28Updated 2 years ago
- ☆26Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- ☆27Updated last year
- ☆87Updated 10 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago